Jay Kumar Mouria

Operations Associate

Chandigarh, Chandigarh, India9 mos experience

Key Highlights

  • Hands-on experience with Nmap and Metasploit Framework.
  • Implemented 10+ AWS security best practices.
  • Conducted multiple vulnerability assessments and threat modeling.
Stackforce AI infers this person is a Cybersecurity professional with a focus on vulnerability assessment and cloud security.

Contact

Skills

Core Skills

Vulnerability AssessmentPenetration TestingTechnical SupportNetwork Security

Other Skills

AWS Security AuditAccess ControlAnalytical SkillsCommunicationCompliance AnalysisCost-Benefit AnalysisCustomer Service RepresentativeData PrivacyDisaster RecoveryDisaster Recovery PlanningHIPAA Compliance AnalysisIncident ManagementIncident ResponseInternet TroubleshootingInterpersonal Skills

About

Aspiring Cybersecurity Professional with six months of internship experience and a solid foundation in vulnerability assessment, penetration testing, and threat analysis. Leveraging basic hands-on knowledge, I have used tools like Nmap and Metasploit Framework to perform over 50 vulnerability scans, gaining insights into automated security assessments and reporting. I have practical experience in AWS cloud auditing using Trend Micro, where I identified and implemented 10+ best security practices to enhance infrastructure security. While my experience is primarily foundational, I have gained valuable skills in root cause analysis by analyzing AWS logs, pinpointing security events, and generating detailed reports. During my postgraduate program in Cybersecurity, I worked on three capstone projects that helped me develop practical problem-solving skills. These included assessing HIPAA compliance for healthcare organizations, conducting vulnerability assessments using the CVSS framework for financial institutions, and performing threat modeling with STRIDE/DREAD methodologies to address critical vulnerabilities. These projects deepened my understanding of real-world scenarios, even though they were largely guided and collaborative. Currently pursuing an MCA in Cybersecurity, I am committed to expanding my knowledge and building a strong technical skill set. My journey is driven by curiosity and a passion for cybersecurity, with a focus on continuous learning and improvement. Tools: Nmap, Metasploit Framework, Lucid Chart, Hydra, Hashcat, Crackmapexec, Nessus

Experience

Cywarden, inc.

Cyber Security Intern

Apr 2024Oct 2024 · 6 mos · Mohali · On-site

  • AWS Security Audit: Consolidated AWS security best practices using Trend Micro. Simultaneously assessed the current state of the client’s AWS infrastructure to determine if the security practices were implemented. Implemented necessary changes to ensure compliance with security requirements.
  • SOC 2 Framework Implementation: Worked with the SOC 2 framework, identifying the five Trust Service Criteria (TSCs), and applied common criteria to help ensure the client environment adhered to necessary security and privacy standards.
  • Root Cause Analysis: Analyzed AWS-generated logs to identify security incidents, tracing events to their source IP addresses. Produced comprehensive reports on the findings and recommended corrective actions to mitigate risks.
  • Vulnerability Assessment and Penetration Testing (VAPT): Conducted VAPT on infrastructure using Metasploit Framework and various automated tools to evaluate the system's current security posture and identify vulnerabilities.
AWS Security AuditTrend MicroRoot Cause AnalysisVulnerability AssessmentPenetration TestingMetasploit Framework

Eclerx

Analyst

Jun 2021Apr 2022 · 10 mos · Chandigarh, India · On-site

  • Monitored and resolved technical issues related to network, connectivity, and hardware for Cox Cable field technicians
  • Utilized backend systems to perform diagnostics and troubleshoot complex technical problems
  • Coordinated with technicians to provide real-time support during service installations and repairs
  • Managed escalations for critical issues and collaborated with internal teams for advanced troubleshooting
  • Identified recurring issues and contributed to process improvements to enhance support efficiency
  • Documented all incidents, troubleshooting steps, and resolution outcomes for internal tracking and reporting
Technical SupportNetwork TroubleshootingIncident ManagementNetwork Security

Education

Amrita Vishwa Vidyapeetham

MCA - Cybersecurity

Nov 2024Oct 2025

Massachusetts Institute of Technology

PG Program in Cybersecurity — Cybersecurity

Sep 2023Aug 2024

Panjab University, Chandigarh

Bachelor's of Arts (Hons) — Defence and Strategic Studies

Jul 2017Oct 2020

Stackforce found 100+ more professionals with Vulnerability Assessment & Penetration Testing

Explore similar profiles based on matching skills and experience